IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

IM (Identity Management)

RSS Feed    Add to Google    Add to My Yahoo!
IM (Identity Management) Reports
 
Protecting Your APIs Against Attack and Hijack with CA Layer 7
sponsored by CA Technologies.
WHITE PAPER: This white paper offers 5 best practices to help thwart API threats, which require different strategies than traditional Web infrastructures.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Five Questions to Ask Your SaaS Provider Before Putting Sensitive Data in the Cloud
sponsored by SailPoint Technologies
WHITE PAPER: Identity governance helps professionals manage and control user access to sensitive applications and data. Access this white paper to find pertinent information for desicion-makers who are in the proces of considering the deployment of SaaS applications.
Posted: 20 Mar 2015 | Published: 29 Mar 2013

SailPoint Technologies

The Current State of Identity and Access Management
sponsored by RSA
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA

Evolve SiteMinder With RadiantOne
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper features a federated identity service that unifies identity policies for simplified management, helping reduce costs for growing user environments.
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

How Desktop Virtualization Simplifies Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Citrix

Identity Management: Implementation And System Support
sponsored by OpenIAM
EGUIDE: In this e-guide, IT experts Randall Gamby and Nilesh Shirke discuss how identity and access management (IAM) and compliance influence each other to help organizations meet business initiatives. Click now for implementation best practices and IAM benefits that go beyond security.
Posted: 10 Jan 2014 | Published: 10 Jan 2014

OpenIAM

Using a Risk-Based Approach to Address a Changing Threat Landscape
sponsored by RSA
WHITE PAPER: In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.
Posted: 15 Nov 2013 | Published: 31 Jan 2013

RSA

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Next Generation Authentication for the Mobile Ready Enterprise
sponsored by RSA
WHITE PAPER: This white paper explores a multi-factor authentication solution that allows organizations to leverage existing security services to better manage the identities accessing IT services from mobile devices.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

RSA

Identity and Access Management Guidelines
sponsored by Radiant Logic, Inc.
EGUIDE: This expert e-guide from SearchSecurity.com offers identity and access management best practices to lock in a strategy that lasts.
Posted: 27 May 2014 | Published: 27 May 2014

Radiant Logic, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement